Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Blueprint: Build the Best in Cyber Defense - Understanding and Applying Threat Intelligence

Understanding and Applying Threat Intelligence

07/07/20 • 40 min

Blueprint: Build the Best in Cyber Defense

Click here to send us your ideas and feedback on Blueprint!

Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it.
Twitter Handles: @likethecoins | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast

PRE-ROLL only! It says lets jump in at the end.

Check out John's SOC Training Courses for SOC Analysts and Leaders:

Follow and Connect with John: LinkedIn

plus icon
bookmark

Click here to send us your ideas and feedback on Blueprint!

Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it.
Twitter Handles: @likethecoins | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast

PRE-ROLL only! It says lets jump in at the end.

Check out John's SOC Training Courses for SOC Analysts and Leaders:

Follow and Connect with John: LinkedIn

Previous Episode

undefined - Privacy Laws: The Future Driver of Cyber Security

Privacy Laws: The Future Driver of Cyber Security

Click here to send us your ideas and feedback on Blueprint!

Mary Chaney shares what types of laws we should be concerned about. She discusses her thoughts on privacy laws and how that will drive cyber security, and what she’s doing to get more diverse representation in the industry at all levels.
Twitter Handles: @MaryNChaney | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast

PRE-ROLL only! It says lets jump in at the end.

Check out John's SOC Training Courses for SOC Analysts and Leaders:

Follow and Connect with John: LinkedIn

Next Episode

undefined - Training Yourself in a Quarantined World

Training Yourself in a Quarantined World

Click here to send us your ideas and feedback on Blueprint!

Dave and Ryan speak with John about resources for training yourself, and the challenges of setting up a large-scale cyber lab to simulate an advanced attack for their Splunk Boss of the SOC competition.
Twitter Handles: @daveherrald | @meansec | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast

PRE-ROLL only! It says lets jump in at the end.

Check out John's SOC Training Courses for SOC Analysts and Leaders:

Follow and Connect with John: LinkedIn

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/blueprint-build-the-best-in-cyber-defense-234200/understanding-and-applying-threat-intelligence-26251401"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to understanding and applying threat intelligence on goodpods" style="width: 225px" /> </a>

Copy